Invasion Detection Model Using Two-Stage Criterion of Detection of Network Anomalies

AuthID
P-00T-83Q
5
Author(s)
Buriachok, V
·
Ageyev, D
·
Zhyltsov, O
·
Skladannyi, P
·
4
Editor(s)
Buriachok,V;Ageyev,D;Lahno,V;Sokolov,V
Document Type
Proceedings Paper
Year published
2020
Published
in CYBERSECURITY PROVIDING IN INFORMATION AND TELECOMMUNICATION SYSTEMS (CPITS 2020), ISSN: 1613-0073
Volume: 2746, Pages: 23-32 (10)
Indexing
Publication Identifiers
Dblp: conf/cpits/BuriachokAZSS20
Scopus: 2-s2.0-85096946608
Wos: WOS:000651092800003
Source Identifiers
ISSN: 1613-0073
Export Publication Metadata
Marked List
Citations
Oops! It looks like you don't have access to this content.

This section is restricted to uses with b-on access.



CORE Conference
No information about CORE Rank

During the preprocessing phase, only publications of type 'Proceedings Paper' or 'Proceedings' are automatically processed to identify their CORE Rank.

TIP: If your publication's CORE Rank is missing, you can contact with your institutional manager to have the correct ranking manually added to the record.

Journal Factors
Oops! It looks like you don't have access to this content.

This section is restricted to uses with b-on access.

Info
At this moment we don't have any links to full text documens.